Lunch & Learn

Take advantage of the opportunity to listen to an innovative industry presentation while enjoying a complimentary boxed lunch. Pre-registration is required. Seating is limited.

Monday, 13 August

Lunch & Learn 1

“Machine vs. Malware”

Artificial intelligence has been a widely adopted approach to solving many business and social problems using advanced data mining and compute capabilities. During this session artificial intelligence will be described from a functional perspective to provide the basis of how it will be used to combat cybercriminals at the perimeter of IT enterprise and out to individual end-point clients. A specific implementation of a deep learning system will be provided to give insight into one of many potential uses of this type of technology to combat the ever-increasing efforts to compromise data and systems.

                       Presented by: Fortinet

Coffee Talk

“Enabling the Workforce for the 21st Century With An intelligent Automation Foundation”

Government leaders are being urged to leverage new and innovative digital technologies; embrace automation, cognitive tools, and augment their workforce with limited resources; and to use data to further their mission objectives. Blue Prism Robotic Process Automation is today’s leading RPA platform that connects disparate, legacy systems and enables access to data in order to address the mission of creating the workforce for the 21st century. With Blue Prism, agencies can reduce operation costs, improve citizen experience and enhance overall workforce satisfaction.

Join Michael Marchuk and Andrew Lasko to learn the many benefits of Blue Prism Robotic Process Automation and how it helps the intelligence community transform mission capabilities through AI enabled Digital Workers. As the world’s leading Robotic Process Automation (RPA) provider, Blue Prism is the platform that enables technologies such as artificial intelligence (AI), machine learning and cloud capabilities to easily integrate with business operations to deliver value. It offers a secure, scalable and easy-to-use Digital Workforce that augments human talent and increases productivity, improves customer experiences and delivers the foundation for a true digital transformation strategy.

                       Presented by: Blue Prism

Lunch & Learn 2

“Blockchain’s Advantage for National Security”

As threats to national security continue to evolve, advantages accrue to those best able to source, assess and act on information. Blockchain is rapidly being adopted by organizations with challenges where trusted, traceable, fast and secure information is essential. IBM has developed the industry’s leading enterprise blockchain solutions with over 400 clients building solutions for supply chain/logistics, additive manufacturing, secure information sharing and healthcare, among other areas. IBM Executives will share the latest research and discuss applications of blockchain to defense and intelligence community needs, especially how it combines with AI, IoT and other emerging tech, to create advantages against the evolving national security threat.

                       Presented by: IBM

Tuesday, 14 August

Lunch & Learn 1

“Intelligent Security at the Network Edge”

A look at how Allied Telesis solutions provide a smart and secure network edge while reducing management effort and cost at the same time.

                       Presented by: Allied Telesis

Lunch & Learn 2

“Rethinking Data Protection: From Monitoring Threats to Taking Action”

Digital transformation, cloud, and mobility are driving information technology to an inflection point. Nowhere is this more evident than within government environments, where IT works to transform and modernize their infrastructure, technology, approaches, and methods. Here, the stakes are high; stopping cyber threats is critical to the safety of our citizens. Unfortunately, traditional data protection tools are limited. Their use of static policy management forces security teams to make enforcement decisions about activity without insight into its broader context. Cybersecurity must evolve to risk-adaptive data protection, which integrates data analytics with control and enforcement capabilities that can identify risky activity and adjust policies as behavior change. In this session we will explore how risk-adaptive data protection cuts through the noise of alerts and provides early warning signals to prevent data loss. This new approach empowers security teams to better understand user behavior and automate policies to achieve your mission. Join us for an introduction to Forcepoint Risk-Adaptive Data Protection, the fastest way to proactively identify risk and protect your people, critical data, and networks.

                       Presented by: Forcepoint

Coffee Talk

“The Present and Future of the Streaming Platform”

A look at how organizations are changing to an Event Driven Platform using Confluent and Apache Kafka, simplifying their data pipeline needs and allowing them to capitalize on insight at all points of the data value lifecycle.

                       Presented by: Confluent

Wednesday, 15 August

Lunch & Learn 1

“Securing AV the Correct Way”

Secure data systems have long been a hallmark of many government institutions. Why should AV components of command, control, and collaboration require waivers and exceptions? Given the richness of multimedia, it should be treated the same if not more stringently. Join us to understand these security requirements and how to secure these systems, without waivers, and achieve a credible RMF package.

                       Presented by: Harman logo

Lunch & Learn 2

"Enabling DevSecOps for Microservices with Red Hat Openshift"

Red Hat’s Openshift Container Management Platform (OCP) is already an excellent tool for implementing, hosting, and managing microservices. Its kubernetes scheduler provides dynamic flexibility and automatic scaling and application connectivity via an internal SDN – all in a fully integrated, developer friendly environment. But the latest additions to the OCP platform around Istio target microservices with tailored components for these unique use cases, including traffic monitoring and fault detection, service and application bundling, and many other capabilities. But its most significant and possibly most overlooked capabilities will ensure consistent security implementations and controls are baked into every service comprising an application, so your developers can focus on the business logic and component reuse, and your system security staff will know security is correctly built-on from the start. In this session we will outline the various security features OCP provides natively and through Istio and how they enable your future DevSecOps organization.

                       Presented by: Red Hat logo